First published: Mon Jan 27 2020(Updated: )
The netprint App for iOS 3.2.3 and earlier does not verify X.509 certificates from servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Fujixerox Netprint | <=3.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-5520.
The severity of CVE-2020-5520 is high.
The netprint App for iOS versions up to and including 3.2.3 are affected by CVE-2020-5520.
An attacker can exploit CVE-2020-5520 by performing a man-in-the-middle attack to spoof servers and obtain sensitive information via a crafted certificate.
Yes, you can find references for CVE-2020-5520 at the following links: [http://jvn.jp/en/jp/JVN66435380/index.html](http://jvn.jp/en/jp/JVN66435380/index.html), [https://www.printing.ne.jp/support/information/AppVulnerability.html](https://www.printing.ne.jp/support/information/AppVulnerability.html).